Abstract is missing.
- Designing a Governmental BackboneArne Ansper. 1-3 [doi]
- Internet Voting in EstoniaPriit Vinkel. 4-12 [doi]
- A Ring Based Onion Circuit for Hidden ServicesHakem Beitollahi, Geert Deconinck. 13-30 [doi]
- User Tracking on the Web via Cross-Browser FingerprintingKároly Boda, Ádám Máté Földes, Gábor György Gulyás, Sándor Imre. 31-46 [doi]
- Comparison of SRAM and FF PUF in 65nm TechnologyMathias Claes, Vincent van der Leest, An Braeken. 47-64 [doi]
- Modular Anomaly Detection for Smartphone Ad Hoc CommunicationJordi Cucurull, Simin Nadjm-Tehrani, Massimiliano Raciti. 65-81 [doi]
- Mental Voting BoothsJérôme Dossogne, Frédéric Lafitte. 82-97 [doi]
- Methods for Privacy Protection Considering Status of Service Provider and User CommunityKazutomo Hamamoto, Yasuyuki Tahara, Akihiko Ohsuga. 98-113 [doi]
- The Security and Memorability of Passwords Generated by Using an Association Element and a Personal FactorKirsi Helkala, Nils Kalstad Svendsen. 114-130 [doi]
- Increasing Service Users' Privacy Awareness by Introducing On-Line Interactive Privacy FeaturesElahe Kani-Zabihi, Martin Helmhout. 131-148 [doi]
- Optimized Inlining of Runtime MonitorsFrédérick Lemay, Raphael Khoury, Nadia Tawbi. 149-161 [doi]
- Identity-Based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication ServiceRadu Lupu, Eugen Borcoci, Tinku Rasheed. 162-175 [doi]
- Feature Reduction to Speed Up Malware ClassificationVeelasha Moonsamy, Ronghua Tian, Lynn Margaret Batten. 176-188 [doi]
- Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible ServiceAssem Nazar, Mark M. Seeger, Harald Baier. 189-204 [doi]
- An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor NetworksJaydip Sen, Subhamoy Maitra. 205-222 [doi]
- Disjunction Category LabelsDeian Stefan, Alejandro Russo, David Mazières, John C. Mitchell. 223-239 [doi]
- Visualization Control for Event-Based Public Display Systems Used in a Hospital SettingInger Anne Tøndel. 240-255 [doi]
- Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware ImplementationsErich Wenger, Michael Hutter. 256-271 [doi]